ARTICLES

Why Google’s Keystore is Critical to Secure Android 9

Recently, Google added new Android Key Security features for Android Pie to make the phone more secure. Read on to know more about it... Android...

Why You Should Not Use these Android Apps

According to a recent report, there are many apps on Google Play Store which are not only malicious but also a threat to privacy....

How World’s First Blockchain Smartphone can Secure Bitcoin

Recently, world's first blockchain smartphone was launched with the cryptocurrency wallet feature. Read on to know more about it... Sirin Finney -- world's first blockchain...

How Blockchain Technology Can Minimize Banking Frauds

Blockchain technology finds its application in the banking sector as it ensures transparency to all parties. Read on to know more on how Blockchain...

NEWS

Operation SharpShooter attacks nuclear, defense, energy, and financial companies

Source: Cyware | By Sophia Brown • Just between October to November, the campaign targeted 87 organizations across 24 countries. • The threat actors used a...

New Mac malware LamePyre can spy on you and run a...

Source: Cyware | By Sophia Brown • LamePyre takes screenshots and sends them to its C2 server. It uses the open source backdoor EmPyre to...

China behind Marriott hack that collected personal details of 500 mn...

Source: Indo-Asian News Service The cyber attack on the Marriott hotel chain that collected personal details of some 500 million guests was part of a...

Meta Networks Forecasts Five Technology Trends in 2019

Meta Networks Forecasts Five Technology Trends that will Drive Demand for Zero-Trust Software Defined Perimeters in 2019 Meta Networks Ltd., highlighted five technology trends the...

INTERVIEWS

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...